1.
2.
3.
Show HN: Duplicate 3 layers in a 24B LLM, logical deduction .22→.76. No training
(news.ycombinator.com)
4.
Use the Military Sleep Method to fall asleep within 2 minutes, starting tonight
(feeds.feedburner.com)
5.
Entomologists use a particle accelerator to image ants at scale
(news.ycombinator.com)
6.
Does that use a lot of energy?
(news.ycombinator.com)
7.
Iran War Cost Tracker
(news.ycombinator.com)
8.
Use the Mikado Method to do safe changes in a complex codebase
(news.ycombinator.com)
9.
Scipy.stats. Chatterjeexi
(news.ycombinator.com)
10.
Why Testing AI for Safety Is Necessary — But Still Not Enough
(feeds.feedburner.com)
11.
IEEE Course Improves Engineers’ Writing Skills
(spectrum.ieee.org)
12.
Now Verizon has some good news if you want to unlock your phone
(androidauthority.com)
15.
Show HN: Bonsplit – Tabs and splits for native macOS apps
(news.ycombinator.com)
16.
17.
Use of Bayesian methodology in clinical trials of drug and biological products [pdf]
(news.ycombinator.com)
18.
Rust is beyond object-oriented, part 3: Inheritance (2023)
(news.ycombinator.com)
19.
Show HN: Feature detection exploration in Lidar DEMs via differential decomp
(news.ycombinator.com)
20.
ZJIT is now available in Ruby 4.0
(news.ycombinator.com)
21.
‘Wolf DNA’ Lurks in Many Modern Dog Breeds
(wired.com)
22.
23.
CSRF protection without tokens or hidden form fields
(news.ycombinator.com)
24.
Research Reveals the Optimal Way to Optimize
(wired.com)
25.
Comptime – C# meta-programming with compile-time code generation and evaluation
(news.ycombinator.com)
26.
Buteyko Method
(news.ycombinator.com)
27.
30.
A two-person method to simulate die rolls (2023)
(news.ycombinator.com)